Analysis
-
max time kernel
143s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
aa7daba1657a62aac426317f4a069db1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
aa7daba1657a62aac426317f4a069db1.exe
Resource
win10v2004-20230220-en
General
-
Target
aa7daba1657a62aac426317f4a069db1.exe
-
Size
1.2MB
-
MD5
aa7daba1657a62aac426317f4a069db1
-
SHA1
370a1c790d3e3dfd7b4cc535e225eb53667689e5
-
SHA256
9404c1b483cfb08ebefacedc12657788826b8c36f59dc379efde17c1ce5eb59a
-
SHA512
0526904b6b91bf2e274931eb41755982fdc03277bf6d5e3ccf90a105a7eb3b503f6d9ab59e9491c16d8ec1358702eb78ea536368a46bfee71e2be8a2bd9556f4
-
SSDEEP
24576:OyfOWI5DowpDRdt7iBnfYFvBzmYiydvb1mf+HRN:doR77iBkvBzmZydT1mf+HR
Malware Config
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/800-155-0x0000000007370000-0x0000000007988000-memory.dmp redline_stealer behavioral2/memory/800-160-0x0000000007140000-0x00000000071A6000-memory.dmp redline_stealer behavioral2/memory/800-166-0x0000000008080000-0x0000000008242000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h0288861.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h0288861.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h0288861.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h0288861.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h0288861.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h0288861.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation i1814014.exe -
Executes dropped EXE 7 IoCs
pid Process 1324 x6018618.exe 660 x9356417.exe 800 g6825611.exe 2820 h0288861.exe 1248 i1814014.exe 4980 1.exe 2316 j8750129.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h0288861.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h0288861.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce aa7daba1657a62aac426317f4a069db1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aa7daba1657a62aac426317f4a069db1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6018618.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6018618.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x9356417.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9356417.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Windows\\Temp\\1.exe" i1814014.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 3876 2820 WerFault.exe 92 4504 1248 WerFault.exe 97 4912 2316 WerFault.exe 101 2792 2316 WerFault.exe 101 3600 2316 WerFault.exe 101 3516 2316 WerFault.exe 101 660 2316 WerFault.exe 101 3788 2316 WerFault.exe 101 4952 2316 WerFault.exe 101 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 800 g6825611.exe 800 g6825611.exe 2820 h0288861.exe 2820 h0288861.exe 4980 1.exe 4980 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 800 g6825611.exe Token: SeDebugPrivilege 2820 h0288861.exe Token: SeDebugPrivilege 1248 i1814014.exe Token: SeDebugPrivilege 4980 1.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 648 wrote to memory of 1324 648 aa7daba1657a62aac426317f4a069db1.exe 84 PID 648 wrote to memory of 1324 648 aa7daba1657a62aac426317f4a069db1.exe 84 PID 648 wrote to memory of 1324 648 aa7daba1657a62aac426317f4a069db1.exe 84 PID 1324 wrote to memory of 660 1324 x6018618.exe 85 PID 1324 wrote to memory of 660 1324 x6018618.exe 85 PID 1324 wrote to memory of 660 1324 x6018618.exe 85 PID 660 wrote to memory of 800 660 x9356417.exe 86 PID 660 wrote to memory of 800 660 x9356417.exe 86 PID 660 wrote to memory of 800 660 x9356417.exe 86 PID 660 wrote to memory of 2820 660 x9356417.exe 92 PID 660 wrote to memory of 2820 660 x9356417.exe 92 PID 660 wrote to memory of 2820 660 x9356417.exe 92 PID 1324 wrote to memory of 1248 1324 x6018618.exe 97 PID 1324 wrote to memory of 1248 1324 x6018618.exe 97 PID 1324 wrote to memory of 1248 1324 x6018618.exe 97 PID 1248 wrote to memory of 4980 1248 i1814014.exe 98 PID 1248 wrote to memory of 4980 1248 i1814014.exe 98 PID 1248 wrote to memory of 4980 1248 i1814014.exe 98 PID 648 wrote to memory of 2316 648 aa7daba1657a62aac426317f4a069db1.exe 101 PID 648 wrote to memory of 2316 648 aa7daba1657a62aac426317f4a069db1.exe 101 PID 648 wrote to memory of 2316 648 aa7daba1657a62aac426317f4a069db1.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa7daba1657a62aac426317f4a069db1.exe"C:\Users\Admin\AppData\Local\Temp\aa7daba1657a62aac426317f4a069db1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6018618.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6018618.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9356417.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9356417.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6825611.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6825611.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:800
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h0288861.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h0288861.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 10845⤵
- Program crash
PID:3876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i1814014.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i1814014.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 15404⤵
- Program crash
PID:4504
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j8750129.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j8750129.exe2⤵
- Executes dropped EXE
PID:2316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 6963⤵
- Program crash
PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 7723⤵
- Program crash
PID:2792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 7923⤵
- Program crash
PID:3600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 9723⤵
- Program crash
PID:3516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 9763⤵
- Program crash
PID:660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 9763⤵
- Program crash
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 12283⤵
- Program crash
PID:4952
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2820 -ip 28201⤵PID:896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1248 -ip 12481⤵PID:4964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2316 -ip 23161⤵PID:4776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2316 -ip 23161⤵PID:388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2316 -ip 23161⤵PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2316 -ip 23161⤵PID:5088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2316 -ip 23161⤵PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2316 -ip 23161⤵PID:2816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2316 -ip 23161⤵PID:2328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
339KB
MD529c6918e0ae9f21f58799fefcaec90ec
SHA15322f079d5dd2dc37d171a861d5fa0a83b83d753
SHA256e5cba3788b88223ec589f233f7022454182ed8db6909936974fec2033d5ec317
SHA51290143218fe8dacd4bf5351e0ed4670b4fae1544d823d0d55c9036c8377d44c4a0b881b73953c542c9bef07d12fc6ffc005e544d26d75e27a5577ca2dda578416
-
Filesize
339KB
MD529c6918e0ae9f21f58799fefcaec90ec
SHA15322f079d5dd2dc37d171a861d5fa0a83b83d753
SHA256e5cba3788b88223ec589f233f7022454182ed8db6909936974fec2033d5ec317
SHA51290143218fe8dacd4bf5351e0ed4670b4fae1544d823d0d55c9036c8377d44c4a0b881b73953c542c9bef07d12fc6ffc005e544d26d75e27a5577ca2dda578416
-
Filesize
914KB
MD55acfabd9f747600ab259f1ade3bfa816
SHA1826a1f264312fbe67cffd834e04018736d5f1711
SHA2567039bd19e3b2a91fd08a71a6bc8c568fa8de725b53b28006a692231921f73a81
SHA512637d26dfb221f6989c9ccaa03fb96e28b1a2d09260088a2fc663193b6970dbbc547acaa43368e149f8db6f508431de8701559f676722bd8eb31166ca603397af
-
Filesize
914KB
MD55acfabd9f747600ab259f1ade3bfa816
SHA1826a1f264312fbe67cffd834e04018736d5f1711
SHA2567039bd19e3b2a91fd08a71a6bc8c568fa8de725b53b28006a692231921f73a81
SHA512637d26dfb221f6989c9ccaa03fb96e28b1a2d09260088a2fc663193b6970dbbc547acaa43368e149f8db6f508431de8701559f676722bd8eb31166ca603397af
-
Filesize
547KB
MD548010fe04d6ff3a036fe5766fb3b4314
SHA1c696c7df470ae808f56b0a273fd684d9f2eb6db0
SHA25696f220de8eae6f61c3782996b59b41603d57403363a5541e03d94a6ca2205381
SHA512f2e92c843fee658dc72115f33a5a8d0b4b478b19d6c4392fc38aeb5456427a1f4f2058417af968d9425d7cd3179f0352eed1140526e20fb1a5342f8588481b1c
-
Filesize
547KB
MD548010fe04d6ff3a036fe5766fb3b4314
SHA1c696c7df470ae808f56b0a273fd684d9f2eb6db0
SHA25696f220de8eae6f61c3782996b59b41603d57403363a5541e03d94a6ca2205381
SHA512f2e92c843fee658dc72115f33a5a8d0b4b478b19d6c4392fc38aeb5456427a1f4f2058417af968d9425d7cd3179f0352eed1140526e20fb1a5342f8588481b1c
-
Filesize
416KB
MD59e2dee87728a6e6c8bea7402296d3466
SHA10767a4e85368d25c94a8c73eaf8aafc490149faf
SHA2566fb1bf557dcc679edfae35a6364f9af3a0c59bcefde856408440fec1cf25c02a
SHA5122fa2885e8ca048f2313b96cea5f2e20aae8cc0a84a6596a44f6b178028a6498c59d400ee3aa5260fb793e552a411c8b5d7e47b621f4c80999396b6108185e334
-
Filesize
416KB
MD59e2dee87728a6e6c8bea7402296d3466
SHA10767a4e85368d25c94a8c73eaf8aafc490149faf
SHA2566fb1bf557dcc679edfae35a6364f9af3a0c59bcefde856408440fec1cf25c02a
SHA5122fa2885e8ca048f2313b96cea5f2e20aae8cc0a84a6596a44f6b178028a6498c59d400ee3aa5260fb793e552a411c8b5d7e47b621f4c80999396b6108185e334
-
Filesize
137KB
MD524d6277645a6da94b772bb08253828b2
SHA1b78f0fdcc68bbd1b4ea73fda8d727cdb4a29170b
SHA2560691e48e4ef1cc47b6770ef576405826d9ad17c8b6226a5d755671d37533cac2
SHA512cb2d045baa1821cb1d7e5617989786a58bbce77a1ddc0e2adfed352939f210f6128b9d1ef8d87983d1072c3f59ee01bb2aaf622d8aa4ed1e7d587341b9bfefd9
-
Filesize
137KB
MD524d6277645a6da94b772bb08253828b2
SHA1b78f0fdcc68bbd1b4ea73fda8d727cdb4a29170b
SHA2560691e48e4ef1cc47b6770ef576405826d9ad17c8b6226a5d755671d37533cac2
SHA512cb2d045baa1821cb1d7e5617989786a58bbce77a1ddc0e2adfed352939f210f6128b9d1ef8d87983d1072c3f59ee01bb2aaf622d8aa4ed1e7d587341b9bfefd9
-
Filesize
360KB
MD5edd530c9e66946af03d79dd43c216efe
SHA1521a3b84eebe64181cfff11d1674adaa74876be6
SHA2568b9008bec793e682c81bd75989c1c1606c806799b32c6a27655490bc7874c690
SHA512c728cbf509b7a3d476696755025c264e1f3790ba3880963a63a607435d462c8d417770761387e02130ae1ed7aa4db97c7514d749e7853c2a327d15a0d7c881df
-
Filesize
360KB
MD5edd530c9e66946af03d79dd43c216efe
SHA1521a3b84eebe64181cfff11d1674adaa74876be6
SHA2568b9008bec793e682c81bd75989c1c1606c806799b32c6a27655490bc7874c690
SHA512c728cbf509b7a3d476696755025c264e1f3790ba3880963a63a607435d462c8d417770761387e02130ae1ed7aa4db97c7514d749e7853c2a327d15a0d7c881df
-
Filesize
136KB
MD56b4ad9c773e164effa4804bf294831a7
SHA16a0bfcfaf73aff765b7d515f2527773df326f2cc
SHA256967d69ee61666a88719486692c18ba56a85516035b6b7dacfde589417d3b5c85
SHA512accbdf423c36f8d688adeccfc683c6ac5ab983f6f5461554a1cdbfcd8dfb9cf29bfe75cdf6755dd70fa5c29f0fda4a2119f468dd0c42d80c8d0b0aee1a2137d8
-
Filesize
136KB
MD56b4ad9c773e164effa4804bf294831a7
SHA16a0bfcfaf73aff765b7d515f2527773df326f2cc
SHA256967d69ee61666a88719486692c18ba56a85516035b6b7dacfde589417d3b5c85
SHA512accbdf423c36f8d688adeccfc683c6ac5ab983f6f5461554a1cdbfcd8dfb9cf29bfe75cdf6755dd70fa5c29f0fda4a2119f468dd0c42d80c8d0b0aee1a2137d8
-
Filesize
136KB
MD56b4ad9c773e164effa4804bf294831a7
SHA16a0bfcfaf73aff765b7d515f2527773df326f2cc
SHA256967d69ee61666a88719486692c18ba56a85516035b6b7dacfde589417d3b5c85
SHA512accbdf423c36f8d688adeccfc683c6ac5ab983f6f5461554a1cdbfcd8dfb9cf29bfe75cdf6755dd70fa5c29f0fda4a2119f468dd0c42d80c8d0b0aee1a2137d8